Home
Vishal Chand
Cancel
Preview Image

Is This App Safe ? Guide to macOS Binary Verification

With macOS increasingly targeted by malware, verifying the authenticity and security of applications is more crucial than ever. Whether you’re a cybersecurity researcher, malware analyst, or a macO...

Preview Image

MacOS Malware:Anti-Analysis Tactics and Bypass Techniques

Common Anti-Static Anlysis Approaches String based obfsucation/encryption. Code obfsucation. String based obfuscation methods & bypass 1. Sensitive Strings Disgusied as Constants Note: U...

Preview Image

iScam:When a Word Document Wields More Than Just Words

Analyzing macOS Word Document Malware Malware sample : Click me First let’s confirm file type by using file command. So it’s a word document! Now let put this up in Virus Total Word doc...

Preview Image

Overview to AI Threat categories

I will be categorizing the threats into three primary parts: AI-Specific Attacks (e.g., Backdoors, Arbitrary Code Execution) Infrastructure Vulnerabilities Traditional Vulnerabilities in AI...

Preview Image

Guardrail Comparison

What is Guardrail? Guardrails are used to identify the potential misuse in the query stage and to prevent the model from providing an answer that should not be given. Why do we need our own guardr...

Preview Image

Fooling AI based resume Analyzer

To escape a deluge of generated content, companies are screening your resumes and documents using AI. But there is a way you can still stand out lol Sample Resume Confidential strategy(lol)...

Preview Image

How to Host Your Own Webmail with Roundcube

Postfix: An open-source mail transfer agent (MTA) that handles sending and receiving emails using SMTP. Dovecot: An open-source IMAP and POP3 server that manages email retrieval a...

Preview Image

Windows OS Anti-Analysis Techniques

Table of Contents Types of Anti-Analysis Approaches Avoid Being Analyzed by Tools Approach 2.1. Debugger Detection 2.2. Virtualization Detection 2.3. Analysis Tools Detection Avoid Being Ana...

Preview Image

CAPE V2 & Cuckoo Sandbox Complete Setup

Complete Sandboxing Environment: Cuckoo and CAPE Installation Guide Table of Contents Introduction Prerequisites Base System Setup Cuckoo Installation CAPE Installation Configuration ...